Reverse 200

I can get some odd text file. After some investigation (by googling “ASK/Manchester Clock 64″), I realize that this is output of RFID tag’s bit stream.

How can I get tag number? Accoding to this site http://ift.tt/2t9Qcuq, Output bitstream is repeated tag information by dividing “111111111”, so I extract tag information (part of green letters in below) and calculate it.

Sorry I didn’t explain about this. Forensic_Encyption is recognized as PE32 file by file command, because first 2byte of this file is “MZ(4D 5A)”. So you need to fix this file to replace MZ(4D 5A) -> PK(50 4B).
To do so, You can extract file :-).

Sorry I didn’t explain about this. Forensic_Encyption is recognized as PE32 file by file command, because first 2byte of this file is “MZ(4D 5A)”. So you need to fix this file to replace MZ(4D 5A) -> PK(50 4B).
To do so, You can extract file :-).

thanks for your great writeup, in misc100 i tried to extract the full html2 page from wireshark but i couldn’t so i extract each object one by one and i just found one encoded image . the other one was not in the capture file . my question is how you got the full html page with the two pictures .

And encoded image's size is 440 x 106 pixel, So you need to split this image to first 440 x 53 and next 440 x 53.
I split and combined both images by using GIMP 🙂 (take care not to collapse PNG alpha data.)